Compare commits

..

21 Commits

Author SHA1 Message Date
8f20c46aac [NixOS] Use the default cache before cache.railbird.ai by default 2023-11-19 22:20:34 -07:00
a5ba4c9cc3 [NixOS] Actually add the age file for railbird-sf 2023-11-19 22:15:54 -07:00
9bdd9868be [NixOS] Make railbird-sf a runner 2023-11-19 22:02:16 -07:00
bad70fb304 [NixOS] Add cache.railbird.ai as a binaryCache 2023-11-18 19:03:04 -07:00
8d358a2cd8 [NixOS] Add railbird-sf to syncthing 2023-11-18 18:58:51 -07:00
295ed619ff [NixOS] Temporarily disable some electron stuff 2023-11-17 23:10:44 -07:00
f9042e8e80 [NixOS] Update flake.lock 2023-11-17 22:40:35 -07:00
4ef82e4b02 [NixOS] Forward requests at cache.railbird.ai to ryzen-shine 2023-11-17 19:55:35 -07:00
8b07fdc391 [NixOS] Update cache key to be at cache.railbird.ai 2023-11-17 19:50:09 -07:00
f09cef4606 [NixOS] Move electron stuff into its own module 2023-11-17 18:43:04 -07:00
627596a2fa [git] Uber is not needed anymmore 2023-11-17 18:28:59 -07:00
310383bfa3
Merge pull request #22 from wgester/will
Add railbird-sf config and remove electron dependencies
2023-11-17 18:26:36 -07:00
90c073deea Add railbird-sf config 2023-11-18 01:06:39 +00:00
6459fc06df one more fix 2023-11-17 16:12:37 -07:00
0727fb807d Remove railbird submodule 2023-11-17 16:06:53 -07:00
cc29e3b841 Disable xmonad 2023-11-17 15:52:10 -07:00
5666080f11 Don't use relative paths for submodules 2023-11-17 15:51:58 -07:00
a351adb4ed [NixOS] Cleanups for railbird-sf 2023-11-17 15:31:32 -07:00
f4f3e9f8be Merge branch 'railbird-sf' of https://dev.railbird.ai/wgester/dotfiles into wgester-railbird-sf 2023-11-17 15:27:49 -07:00
2abde807aa [NixOS] Add files that allow enabling of plasma/gnome 2023-11-17 15:26:33 -07:00
63556a37b2 Added railbird-sf config 2023-11-17 14:24:56 -08:00
22 changed files with 349 additions and 224 deletions

6
.gitmodules vendored
View File

@ -1,12 +1,12 @@
[submodule "dotfiles/config/taffybar/taffybar"] [submodule "dotfiles/config/taffybar/taffybar"]
path = dotfiles/config/taffybar/taffybar path = dotfiles/config/taffybar/taffybar
url = ../../taffybar/taffybar.git url = git@github.com:taffybar/taffybar.git
[submodule "dotfiles/xmonad/xmonad"] [submodule "dotfiles/xmonad/xmonad"]
path = dotfiles/config/xmonad/xmonad path = dotfiles/config/xmonad/xmonad
url = ../xmonad.git url = git@github.com:xmonad/xmonad.git
[submodule "dotfiles/xmonad/xmonad-contrib"] [submodule "dotfiles/xmonad/xmonad-contrib"]
path = dotfiles/config/xmonad/xmonad-contrib path = dotfiles/config/xmonad/xmonad-contrib
url = ../xmonad-contrib.git url = git@github.com:xmonad/xmonad-contrib.git
[submodule "dotfiles/config/alacritty/themes"] [submodule "dotfiles/config/alacritty/themes"]
path = dotfiles/config/alacritty/themes path = dotfiles/config/alacritty/themes
url = https://github.com/alacritty/alacritty-theme url = https://github.com/alacritty/alacritty-theme

View File

@ -88,12 +88,6 @@
[rerere] [rerere]
enabled = false enabled = false
[url "ssh://git@github.com/uber/"]
insteadOf = https://github.com/uber/
[url "ssh://gitolite@code.uber.internal:2222/"]
insteadOf = https://code.uber.internal/
[branch] [branch]
autosetuprebase = always autosetuprebase = always

View File

@ -1,4 +1,4 @@
{ config, makeEnable, lib, ... }: { config, lib, ... }:
with lib; with lib;
let cfg = config.modules.cache-server; let cfg = config.modules.cache-server;
in in
@ -8,7 +8,7 @@ in
enable = mkEnableOption "nix cache server"; enable = mkEnableOption "nix cache server";
port = mkOption { port = mkOption {
type = types.int; type = types.int;
default = 8080; default = 5050;
}; };
host-string = mkOption { host-string = mkOption {
type = types.string; type = types.string;
@ -27,18 +27,7 @@ in
services.nix-serve = { services.nix-serve = {
enable = true; enable = true;
secretKeyFile = config.age.secrets."cache-priv-key.pem".path; secretKeyFile = config.age.secrets."cache-priv-key.pem".path;
port = 5050; port = cfg.port;
};
services.nginx = {
enable = true;
recommendedProxySettings = true;
virtualHosts = {
"${cfg.host-string}" = {
locations."${cfg.path}".proxyPass = "http://${config.services.nix-serve.bindAddress}:${toString config.services.nix-serve.port}";
listen = [ { addr = "0.0.0.0"; port = cfg.port; } ];
};
};
}; };
}; };
} }

View File

@ -3,8 +3,8 @@
imports = [ imports = [
./android.nix ./android.nix
./base.nix ./base.nix
./cache.nix
./cache-server.nix ./cache-server.nix
./cache.nix
./code.nix ./code.nix
./desktop.nix ./desktop.nix
./environment.nix ./environment.nix
@ -12,8 +12,10 @@
./extra.nix ./extra.nix
./games.nix ./games.nix
./git-sync.nix ./git-sync.nix
./gitea.nix
./gitea-runner.nix ./gitea-runner.nix
./gitea.nix
./gnome.nix
./electron.nix
./imalison.nix ./imalison.nix
./internet-computer.nix ./internet-computer.nix
./kat.nix ./kat.nix
@ -21,6 +23,7 @@
./nix.nix ./nix.nix
./nixified.ai.nix ./nixified.ai.nix
./options.nix ./options.nix
./plasma.nix
./secrets.nix ./secrets.nix
./ssh.nix ./ssh.nix
./syncthing.nix ./syncthing.nix
@ -36,12 +39,15 @@
config = lib.mkIf config.features.full.enable { config = lib.mkIf config.features.full.enable {
modules.base.enable = true; modules.base.enable = true;
modules.desktop.enable = true; modules.desktop.enable = true;
modules.plasma.enable = true;
modules.gnome.enable = false;
modules.xmonad.enable = true; modules.xmonad.enable = true;
modules.extra.enable = true; modules.extra.enable = true;
modules.electron.enable = true;
modules.code.enable = true; modules.code.enable = true;
modules.games.enable = true; modules.games.enable = true;
modules.syncthing.enable = true; modules.syncthing.enable = true;
modules.fonts.enable = true; modules.fonts.enable = true;
modules.nixified-ai.enable = true; modules.nixified-ai.enable = false;
}; };
} }

View File

@ -1,4 +1,4 @@
{ config, pkgs, options, inputs, makeEnable, forEachUser, ... }: { config, pkgs, makeEnable, forEachUser, ... }:
makeEnable config "modules.desktop" true { makeEnable config "modules.desktop" true {
imports = [ imports = [
./fonts.nix ./fonts.nix
@ -8,13 +8,7 @@ makeEnable config "modules.desktop" true {
exportConfiguration = true; exportConfiguration = true;
enable = true; enable = true;
layout = "us"; layout = "us";
desktopManager = {
plasma5.enable = true;
};
displayManager = { displayManager = {
sddm = {
enable = true;
};
sessionCommands = '' sessionCommands = ''
systemctl --user import-environment GDK_PIXBUF_MODULE_FILE DBUS_SESSION_BUS_ADDRESS PATH systemctl --user import-environment GDK_PIXBUF_MODULE_FILE DBUS_SESSION_BUS_ADDRESS PATH
''; '';
@ -61,7 +55,6 @@ makeEnable config "modules.desktop" true {
clipit clipit
dfeet dfeet
dolphin dolphin
element-desktop
feh feh
firefox firefox
@ -104,35 +97,12 @@ makeEnable config "modules.desktop" true {
graphviz graphviz
nodePackages.mermaid-cli nodePackages.mermaid-cli
] ++ (if pkgs.system == "x86_64-linux" then with pkgs; [ ] ++ (if pkgs.system == "x86_64-linux" then with pkgs; [
bitwarden
discord
etcher
google-chrome google-chrome
keybase-gui
pommed_light pommed_light
slack slack
spicetify-cli spicetify-cli
spotify spotify
tor-browser-bundle-bin tor-browser-bundle-bin
vscode vscode
zoom-us
] else []); ] else []);
home-manager.users = forEachUser (if pkgs.system == "x86_64-linux" then {
systemd.user.services.bitwarden = {
Unit = {
Description = "Bitwarden";
After = [ "graphical-session-pre.target" "tray.target" ];
PartOf = [ "graphical-session.target" ];
};
Install = { WantedBy = [ "graphical-session.target" ]; };
Service = {
ExecStart = "${pkgs.bitwarden}/bin/bitwarden";
Restart = "always";
RestartSec = 3;
};
};
} else {});
} }

28
nixos/electron.nix Normal file
View File

@ -0,0 +1,28 @@
{ pkgs, config, makeEnable, forEachUser, ... }:
makeEnable config "modules.electron" false {
environment.systemPackages = with pkgs; [
# element-desktop
# bitwarden
discord
# etcher
# keybase-gui
zoom-us
];
home-manager.users = forEachUser (if pkgs.system == "x86_64-linux" then {
# systemd.user.services.bitwarden = {
# Unit = {
# Description = "Bitwarden";
# After = [ "graphical-session-pre.target" "tray.target" ];
# PartOf = [ "graphical-session.target" ];
# };
# Install = { WantedBy = [ "graphical-session.target" ]; };
# Service = {
# ExecStart = "${pkgs.bitwarden}/bin/bitwarden";
# Restart = "always";
# RestartSec = 3;
# };
# };
} else {});
}

View File

@ -7,11 +7,11 @@
"nixpkgs": "nixpkgs" "nixpkgs": "nixpkgs"
}, },
"locked": { "locked": {
"lastModified": 1695384796, "lastModified": 1696775529,
"narHash": "sha256-TYlE4B0ktPtlJJF9IFxTWrEeq+XKG8Ny0gc2FGEAdj0=", "narHash": "sha256-TYlE4B0ktPtlJJF9IFxTWrEeq+XKG8Ny0gc2FGEAdj0=",
"owner": "ryantm", "owner": "ryantm",
"repo": "agenix", "repo": "agenix",
"rev": "1f677b3e161d3bdbfd08a939e8f25de2568e0ef4", "rev": "daf42cb35b2dc614d1551e37f96406e4c4a2d3e4",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -61,11 +61,11 @@
"flake-compat_2": { "flake-compat_2": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1673956053, "lastModified": 1696426674,
"narHash": "sha256-4gtG9iQuiKITOjNQQeQIpoIB6b16fm+504Ch3sNKLd8=", "narHash": "sha256-kvjfFW7WAETZlt09AgDn1MrtKzP7t90Vf7vypd3OL1U=",
"owner": "edolstra", "owner": "edolstra",
"repo": "flake-compat", "repo": "flake-compat",
"rev": "35bb57c0c8d8b62bbfd284272c928ceb64ddbde9", "rev": "0f9255e01c2351cc7d116c072cb317785dd33b33",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -114,11 +114,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1677714448, "lastModified": 1685662779,
"narHash": "sha256-Hq8qLs8xFu28aDjytfxjdC96bZ6pds21Yy09mSC156I=", "narHash": "sha256-cKDDciXGpMEjP1n6HlzKinN0H+oLmNpgeCTzYnsA2po=",
"owner": "hercules-ci", "owner": "hercules-ci",
"repo": "flake-parts", "repo": "flake-parts",
"rev": "dc531e3a9ce757041e1afaff8ee932725ca60002", "rev": "71fb97f0d875fd4de4994dfb849f2c75e17eb6c3",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -132,11 +132,11 @@
"nixpkgs-lib": "nixpkgs-lib" "nixpkgs-lib": "nixpkgs-lib"
}, },
"locked": { "locked": {
"lastModified": 1673362319, "lastModified": 1685662779,
"narHash": "sha256-Pjp45Vnj7S/b3BRpZEVfdu8sqqA6nvVjvYu59okhOyI=", "narHash": "sha256-cKDDciXGpMEjP1n6HlzKinN0H+oLmNpgeCTzYnsA2po=",
"owner": "hercules-ci", "owner": "hercules-ci",
"repo": "flake-parts", "repo": "flake-parts",
"rev": "82c16f1682cf50c01cb0280b38a1eed202b3fe9f", "rev": "71fb97f0d875fd4de4994dfb849f2c75e17eb6c3",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -154,11 +154,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1666885127, "lastModified": 1685662779,
"narHash": "sha256-uXA/3lhLhwOTBMn9a5zJODKqaRT+SuL5cpEmOz2ULoo=", "narHash": "sha256-cKDDciXGpMEjP1n6HlzKinN0H+oLmNpgeCTzYnsA2po=",
"owner": "hercules-ci", "owner": "hercules-ci",
"repo": "flake-parts", "repo": "flake-parts",
"rev": "0e101dbae756d35a376a5e1faea532608e4a4b9a", "rev": "71fb97f0d875fd4de4994dfb849f2c75e17eb6c3",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -188,21 +188,6 @@
} }
}, },
"flake-utils_2": { "flake-utils_2": {
"locked": {
"lastModified": 1667077288,
"narHash": "sha256-bdC8sFNDpT0HK74u9fUkpbf1MEzVYJ+ka7NXCdgBoaA=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "6ee9ebb6b1ee695d2cacc4faa053a7b9baa76817",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"flake-utils_3": {
"inputs": { "inputs": {
"systems": "systems" "systems": "systems"
}, },
@ -220,7 +205,7 @@
"type": "github" "type": "github"
} }
}, },
"flake-utils_4": { "flake-utils_3": {
"inputs": { "inputs": {
"systems": "systems_2" "systems": "systems_2"
}, },
@ -238,7 +223,7 @@
"type": "github" "type": "github"
} }
}, },
"flake-utils_5": { "flake-utils_4": {
"inputs": { "inputs": {
"systems": "systems_4" "systems": "systems_4"
}, },
@ -411,6 +396,22 @@
"type": "github" "type": "github"
} }
}, },
"haskell-flake": {
"locked": {
"lastModified": 1684780604,
"narHash": "sha256-2uMZsewmRn7rRtAnnQNw1lj0uZBMh4m6Cs/7dV5YF08=",
"owner": "srid",
"repo": "haskell-flake",
"rev": "74210fa80a49f1b6f67223debdbf1494596ff9f2",
"type": "github"
},
"original": {
"owner": "srid",
"ref": "0.3.0",
"repo": "haskell-flake",
"type": "github"
}
},
"haskell-hie-bios": { "haskell-hie-bios": {
"flake": false, "flake": false,
"locked": { "locked": {
@ -480,7 +481,7 @@
"haskell-language-server": { "haskell-language-server": {
"inputs": { "inputs": {
"flake-compat": "flake-compat_3", "flake-compat": "flake-compat_3",
"flake-utils": "flake-utils_4", "flake-utils": "flake-utils_3",
"fourmolu-011": "fourmolu-011", "fourmolu-011": "fourmolu-011",
"fourmolu-012": "fourmolu-012", "fourmolu-012": "fourmolu-012",
"gitignore": "gitignore", "gitignore": "gitignore",
@ -515,7 +516,7 @@
"haskell-language-server_2": { "haskell-language-server_2": {
"inputs": { "inputs": {
"flake-compat": "flake-compat_4", "flake-compat": "flake-compat_4",
"flake-utils": "flake-utils_5", "flake-utils": "flake-utils_4",
"fourmolu-011": "fourmolu-011_2", "fourmolu-011": "fourmolu-011_2",
"fourmolu-012": "fourmolu-012_2", "fourmolu-012": "fourmolu-012_2",
"gitignore": "gitignore_2", "gitignore": "gitignore_2",
@ -550,16 +551,15 @@
"hercules-ci-agent": { "hercules-ci-agent": {
"inputs": { "inputs": {
"flake-parts": "flake-parts_3", "flake-parts": "flake-parts_3",
"nix-darwin": "nix-darwin", "haskell-flake": "haskell-flake",
"nixpkgs": "nixpkgs_3", "nixpkgs": "nixpkgs_3"
"pre-commit-hooks-nix": "pre-commit-hooks-nix"
}, },
"locked": { "locked": {
"lastModified": 1673183923, "lastModified": 1686721748,
"narHash": "sha256-vb+AEQJAW4Xn4oHsfsx8H12XQU0aK8VYLtWYJm/ol28=", "narHash": "sha256-ilD6ANYID+b0/+GTFbuZXfmu92bqVqY5ITKXSxqIp5A=",
"owner": "hercules-ci", "owner": "hercules-ci",
"repo": "hercules-ci-agent", "repo": "hercules-ci-agent",
"rev": "b3f8aa8e4a8b22dbbe92cc5a89e6881090b933b3", "rev": "7192b83935ab292a8e894db590dfd44f976e183b",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -577,11 +577,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1676558019, "lastModified": 1686830987,
"narHash": "sha256-obUHCMMWbffb3k0b9YIChsJ2Z281BcDYnTPTbJRP6vs=", "narHash": "sha256-1XLTM0lFr3NV+0rd55SQW/8oQ3ACnqlYcda3FelIwHU=",
"owner": "hercules-ci", "owner": "hercules-ci",
"repo": "hercules-ci-effects", "repo": "hercules-ci-effects",
"rev": "fdbc15b55db8d037504934d3af52f788e0593380", "rev": "04e4ab63b9eed2452edee1bb698827e1cb8265c6",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -700,11 +700,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1696145345, "lastModified": 1700261679,
"narHash": "sha256-3dM7I/d4751SLPJah0to1WBlWiyzIiuCEUwJqwBdmr4=", "narHash": "sha256-jpQq/rJnjhkUHXz/KOQxk6fSfF7H0vV9PjFvfgTFHG8=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "6f9b5b83ad1f470b3d11b8a9fe1d5ef68c7d0e30", "rev": "3feeb7715584fd45ed1389cec8fb15f6930e8dab",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -730,7 +730,7 @@
}, },
"locked": { "locked": {
"lastModified": 1, "lastModified": 1,
"narHash": "sha256-ull5epb7JsgkrUEfC+p9j0dPjJKix8Kbn3/J7NSFfY8=", "narHash": "sha256-rua03PcdrDhQoRjqAVHqUHfTUazlK0L1Pw8iIMM+YDA=",
"path": "../dotfiles/config/taffybar", "path": "../dotfiles/config/taffybar",
"type": "path" "type": "path"
}, },
@ -742,37 +742,20 @@
"invokeai-src": { "invokeai-src": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1677475057, "lastModified": 1697424725,
"narHash": "sha256-REtyVcyRgspn1yYvB4vIHdOrPRZRNSSraepHik9MfgE=", "narHash": "sha256-y3nxZ4PQ/d2wMX1crpJPDMYXf48YBG0sRIBOTgN6XlI=",
"owner": "invoke-ai", "owner": "invoke-ai",
"repo": "InvokeAI", "repo": "InvokeAI",
"rev": "650f4bb58ceca458bff1410f35cd6d6caad399c6", "rev": "ad786130ffb11f91cbfcc40846114dd1fdcecdf6",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "invoke-ai", "owner": "invoke-ai",
"ref": "v2.3.1.post2", "ref": "v3.3.0post3",
"repo": "InvokeAI", "repo": "InvokeAI",
"type": "github" "type": "github"
} }
}, },
"koboldai-src": {
"flake": false,
"locked": {
"lastModified": 1668957963,
"narHash": "sha256-fKQ/6LiMmrfSWczC5kcf6M9cpuF9dDYl2gJ4+6ZLSdY=",
"owner": "koboldai",
"repo": "koboldai-client",
"rev": "f2077b8e58db6bd47a62bf9ed2649bb0711f9678",
"type": "github"
},
"original": {
"owner": "koboldai",
"ref": "1.19.2",
"repo": "koboldai-client",
"type": "github"
}
},
"lowdown-src": { "lowdown-src": {
"flake": false, "flake": false,
"locked": { "locked": {
@ -883,43 +866,20 @@
"type": "github" "type": "github"
} }
}, },
"nix-darwin": {
"inputs": {
"nixpkgs": [
"nixified-ai",
"hercules-ci-effects",
"hercules-ci-agent",
"nixpkgs"
]
},
"locked": {
"lastModified": 1667419884,
"narHash": "sha256-oLNw87ZI5NxTMlNQBv1wG2N27CUzo9admaFlnmavpiY=",
"owner": "LnL7",
"repo": "nix-darwin",
"rev": "cfc0125eafadc9569d3d6a16ee928375b77e3100",
"type": "github"
},
"original": {
"owner": "LnL7",
"repo": "nix-darwin",
"type": "github"
}
},
"nixified-ai": { "nixified-ai": {
"inputs": { "inputs": {
"flake-parts": "flake-parts", "flake-parts": "flake-parts",
"hercules-ci-effects": "hercules-ci-effects", "hercules-ci-effects": "hercules-ci-effects",
"invokeai-src": "invokeai-src", "invokeai-src": "invokeai-src",
"koboldai-src": "koboldai-src", "nixpkgs": "nixpkgs_4",
"nixpkgs": "nixpkgs_4" "textgen-src": "textgen-src"
}, },
"locked": { "locked": {
"lastModified": 1685671845, "lastModified": 1698023400,
"narHash": "sha256-qVA3wIxPb9PIFqa9Wf2a9jRMeMhE4kWw2y3oPSuRHU4=", "narHash": "sha256-2wrm9Y9gsI/OaZEsTqc2wflkfxlrvCRocJHpqkOm/Cc=",
"owner": "nixified-ai", "owner": "nixified-ai",
"repo": "flake", "repo": "flake",
"rev": "0c58f8cba3fb42c54f2a7bf9bd45ee4cbc9f2477", "rev": "7b9730e0a75bcd6375b0780aef75e406ea20a9a4",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -930,11 +890,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1696161939, "lastModified": 1699997707,
"narHash": "sha256-HI1DxS//s46/qv9dcW06TzXaBjxL2DVTQP8R1QsnHzM=", "narHash": "sha256-ugb+1TGoOqqiy3axyEZpfF6T4DQUGjfWZ3Htry1EfvI=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "0ab3ee718e964fb42dc57ace6170f19cb0b66532", "rev": "5689f3ebf899f644a1aabe8774d4f37eb2f6c2f9",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -946,15 +906,15 @@
"nixos-wsl": { "nixos-wsl": {
"inputs": { "inputs": {
"flake-compat": "flake-compat_2", "flake-compat": "flake-compat_2",
"flake-utils": "flake-utils_3", "flake-utils": "flake-utils_2",
"nixpkgs": "nixpkgs_5" "nixpkgs": "nixpkgs_5"
}, },
"locked": { "locked": {
"lastModified": 1696053802, "lastModified": 1700096639,
"narHash": "sha256-8TTbJbtGDz1MstExrVQe56eXZpovvZv6G6L6q/4NOKg=", "narHash": "sha256-FVOTqjwjLX4El7n3jErrWWQ4gR5NVcL7B8cvGRGFQSo=",
"owner": "nix-community", "owner": "nix-community",
"repo": "NixOS-WSL", "repo": "NixOS-WSL",
"rev": "cadde47d123d1a534c272b04a7582f1d11474c48", "rev": "83ce0dbe362b9b866414bbc31a2dc9f1d41be649",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -982,11 +942,11 @@
"nixpkgs-lib": { "nixpkgs-lib": {
"locked": { "locked": {
"dir": "lib", "dir": "lib",
"lastModified": 1672350804, "lastModified": 1685564631,
"narHash": "sha256-jo6zkiCabUBn3ObuKXHGqqORUMH27gYDIFFfLq5P4wg=", "narHash": "sha256-8ywr3AkblY4++3lIVxmrWZFzac7+f32ZEhH/A8pNscI=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "677ed08a50931e38382dbef01cba08a8f7eac8f6", "rev": "4f53efe34b3a8877ac923b9350c874e3dcd5dc0a",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1015,11 +975,11 @@
}, },
"nixpkgs-regression_2": { "nixpkgs-regression_2": {
"locked": { "locked": {
"lastModified": 1696214716, "lastModified": 1700284104,
"narHash": "sha256-Buev0E1vvNdjI8MOsJd8GtgSI0/BRPZZTsBtUC0HDbY=", "narHash": "sha256-oNsJfAyAuBCTkusesiK0LWuO59F6vEGcP4wwa7kc1ZA=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "6f7933059d0a9e8c8a9cb00a59c05e35c53a5be5", "rev": "005617587ee2b7c003388b4539b9120ebcc90e44",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1046,11 +1006,11 @@
}, },
"nixpkgs_3": { "nixpkgs_3": {
"locked": { "locked": {
"lastModified": 1672262501, "lastModified": 1686501370,
"narHash": "sha256-ZNXqX9lwYo1tOFAqrVtKTLcJ2QMKCr3WuIvpN8emp7I=", "narHash": "sha256-G0WuM9fqTPRc2URKP9Lgi5nhZMqsfHGrdEbrLvAPJcg=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "e182da8622a354d44c39b3d7a542dc12cd7baa5f", "rev": "75a5ebf473cd60148ba9aec0d219f72e5cf52519",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1062,11 +1022,11 @@
}, },
"nixpkgs_4": { "nixpkgs_4": {
"locked": { "locked": {
"lastModified": 1677932085, "lastModified": 1697059129,
"narHash": "sha256-+AB4dYllWig8iO6vAiGGYl0NEgmMgGHpy9gzWJ3322g=", "narHash": "sha256-9NJcFF9CEYPvHJ5ckE8kvINvI84SZZ87PvqMbH6pro0=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "3c5319ad3aa51551182ac82ea17ab1c6b0f0df89", "rev": "5e4c2ada4fcd54b99d56d7bd62f384511a7e2593",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1078,11 +1038,11 @@
}, },
"nixpkgs_5": { "nixpkgs_5": {
"locked": { "locked": {
"lastModified": 1695825837, "lastModified": 1697851979,
"narHash": "sha256-4Ne11kNRnQsmSJCRSSNkFRSnHC4Y5gPDBIQGjjPfJiU=", "narHash": "sha256-lJ8k4qkkwdvi+t/Xc6Fn74kUuobpu9ynPGxNZR6OwoA=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "5cfafa12d57374f48bcc36fda3274ada276cf69e", "rev": "5550a85a087c04ddcace7f892b0bdc9d8bb080c8",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1094,11 +1054,11 @@
}, },
"nixpkgs_6": { "nixpkgs_6": {
"locked": { "locked": {
"lastModified": 1696019113, "lastModified": 1699963925,
"narHash": "sha256-X3+DKYWJm93DRSdC5M6K5hLqzSya9BjibtBsuARoPco=", "narHash": "sha256-LE7OV/SwkIBsCpAlIPiFhch/J+jBDGEZjNfdnzCnCrY=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "f5892ddac112a1e9b3612c39af1b72987ee5783a", "rev": "bf744fe90419885eefced41b3e5ae442d732712d",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1215,30 +1175,6 @@
"url": "https://hackage.haskell.org/package/ormolu-0.7.1.0/ormolu-0.7.1.0.tar.gz" "url": "https://hackage.haskell.org/package/ormolu-0.7.1.0/ormolu-0.7.1.0.tar.gz"
} }
}, },
"pre-commit-hooks-nix": {
"inputs": {
"flake-utils": "flake-utils_2",
"nixpkgs": [
"nixified-ai",
"hercules-ci-effects",
"hercules-ci-agent",
"nixpkgs"
]
},
"locked": {
"lastModified": 1667760143,
"narHash": "sha256-+X5CyeNEKp41bY/I1AJgW/fn69q5cLJ1bgiaMMCKB3M=",
"owner": "cachix",
"repo": "pre-commit-hooks.nix",
"rev": "06f48d63d473516ce5b8abe70d15be96a0147fcd",
"type": "github"
},
"original": {
"owner": "cachix",
"repo": "pre-commit-hooks.nix",
"type": "github"
}
},
"root": { "root": {
"inputs": { "inputs": {
"agenix": "agenix", "agenix": "agenix",
@ -1425,23 +1361,43 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1, "lastModified": 1696612500,
"narHash": "sha256-m73WjXb6o0r4iPhBUUPrRUpToe9giRJZe4Xu3yfWfwQ=", "narHash": "sha256-Q19F91yVQviqxgY+FkvEwtX2vcw414eVtK8erim0NrU=",
"path": "../dotfiles/config/taffybar/taffybar", "owner": "taffybar",
"type": "path" "repo": "taffybar",
"rev": "46eba89c2a4d4ffefe42c3ee4506d1b74c8e61fd",
"type": "github"
}, },
"original": { "original": {
"path": "../dotfiles/config/taffybar/taffybar", "owner": "taffybar",
"type": "path" "repo": "taffybar",
"type": "github"
}
},
"textgen-src": {
"flake": false,
"locked": {
"lastModified": 1696789008,
"narHash": "sha256-+V8XOVnEyImj+a8uCkZXEHXW8bTIBRlnfMcQfcZNgqg=",
"owner": "oobabooga",
"repo": "text-generation-webui",
"rev": "2e471071af48e19867cfa522d2def44c24785c50",
"type": "github"
},
"original": {
"owner": "oobabooga",
"ref": "v1.7",
"repo": "text-generation-webui",
"type": "github"
} }
}, },
"unstable": { "unstable": {
"locked": { "locked": {
"lastModified": 1696019113, "lastModified": 1699963925,
"narHash": "sha256-X3+DKYWJm93DRSdC5M6K5hLqzSya9BjibtBsuARoPco=", "narHash": "sha256-LE7OV/SwkIBsCpAlIPiFhch/J+jBDGEZjNfdnzCnCrY=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "f5892ddac112a1e9b3612c39af1b72987ee5783a", "rev": "bf744fe90419885eefced41b3e5ae442d732712d",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1465,14 +1421,17 @@
"unstable": "unstable" "unstable": "unstable"
}, },
"locked": { "locked": {
"lastModified": 1, "lastModified": 1699833963,
"narHash": "sha256-dOrvPpypuNn/fAWY2XjMacpsAXEiMZ4Dll3Ot81iQL4=", "narHash": "sha256-JNT6nnDJUvi/aPh9nOP7dQJGrfMdjzEabbHc+Qduwic=",
"path": "../dotfiles/config/xmonad/xmonad", "owner": "xmonad",
"type": "path" "repo": "xmonad",
"rev": "2f585679120747defaa8b49880cbbab943b4c22c",
"type": "github"
}, },
"original": { "original": {
"path": "../dotfiles/config/xmonad/xmonad", "owner": "xmonad",
"type": "path" "repo": "xmonad",
"type": "github"
} }
}, },
"xmonad-contrib": { "xmonad-contrib": {

View File

@ -22,7 +22,7 @@
}; };
xmonad = { xmonad = {
url = "path:../dotfiles/config/xmonad/xmonad"; url = "github:xmonad/xmonad";
inputs = { inputs = {
nixpkgs.follows = "nixpkgs"; nixpkgs.follows = "nixpkgs";
flake-utils.follows = "flake-utils"; flake-utils.follows = "flake-utils";
@ -31,7 +31,7 @@
}; };
taffybar = { taffybar = {
url = "path:../dotfiles/config/taffybar/taffybar"; url = "github:taffybar/taffybar";
inputs = { inputs = {
nixpkgs.follows = "nixpkgs"; nixpkgs.follows = "nixpkgs";
flake-utils.follows = "flake-utils"; flake-utils.follows = "flake-utils";
@ -154,7 +154,7 @@
inherit inputs machineNames; inherit inputs machineNames;
makeEnable = (import ./make-enable.nix) nixpkgs.lib; makeEnable = (import ./make-enable.nix) nixpkgs.lib;
mapValueToKeys = keys: value: builtins.listToAttrs (map (name: { inherit name value; }) keys); mapValueToKeys = keys: value: builtins.listToAttrs (map (name: { inherit name value; }) keys);
realUsers = [ "root" "imalison" "kat" "dean" "alex" ]; realUsers = [ "root" "imalison" "kat" "dean" "alex" "will" ];
forEachUser = mapValueToKeys realUsers; forEachUser = mapValueToKeys realUsers;
keys = (import ./keys.nix); keys = (import ./keys.nix);
} // specialArgs; } // specialArgs;

View File

@ -2,7 +2,7 @@
makeEnable config "modules.games" false { makeEnable config "modules.games" false {
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
steam steam
heroic # heroic
]; ];
boot.extraModulePackages = with pkgs; [ boot.extraModulePackages = with pkgs; [
xboxdrv xboxdrv

7
nixos/gnome.nix Normal file
View File

@ -0,0 +1,7 @@
{ config, makeEnable, ... }:
makeEnable config "modules.gnome" false {
services.xserver = {
desktopManager.gnome3.enable = true;
displayManager.gdm.enable = true;
};
}

View File

@ -34,10 +34,15 @@ rec {
andyKeys = [ andyKeys = [
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqBnDZXcZIMtOTPxg4pJWyMyNp84kpU2uH88aCkrhMBY2TI4dqAXGY4h1DOyOEyQo9nTgyvdlv4M1Hlp5tzfbuapdTWtt36gb+FKpsTUy8dz45fhKJerUszNbVQ+SpZu4ZFN4Nv9eP3AHO+Mzjcvbf666VMDEzZWu2totd7jxyI9PdK78TD5AOi+kGTtbEgqMpJCcZmJlzJ9NJJ2ejhPCRwcfDrShHcfMeEwWL5MmnzT+WstkRwJAM0f9/ks77jWDnB1Eu55rQykU8zVZ1nz1GiXZcxUpm6B0IRhwn8NGH6nVzSLITtO5eJ7LPQR9XNUODpbrsVGNK6jgGql9gZpYp andy@nixos" "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqBnDZXcZIMtOTPxg4pJWyMyNp84kpU2uH88aCkrhMBY2TI4dqAXGY4h1DOyOEyQo9nTgyvdlv4M1Hlp5tzfbuapdTWtt36gb+FKpsTUy8dz45fhKJerUszNbVQ+SpZu4ZFN4Nv9eP3AHO+Mzjcvbf666VMDEzZWu2totd7jxyI9PdK78TD5AOi+kGTtbEgqMpJCcZmJlzJ9NJJ2ejhPCRwcfDrShHcfMeEwWL5MmnzT+WstkRwJAM0f9/ks77jWDnB1Eu55rQykU8zVZ1nz1GiXZcxUpm6B0IRhwn8NGH6nVzSLITtO5eJ7LPQR9XNUODpbrsVGNK6jgGql9gZpYp andy@nixos"
]; ];
willKeys = []; willKeys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILgLjW6R+dTEmlUoPfE4GA8gRn93UlcSJqlJP1xw0KWl willgester@gmail.com"
];
loewyKeys = [ loewyKeys = [
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDROb8zcXAgqR3xNpStjt8kSL2Tnic+aWVlQRkmmLveay0RDPatHVKiWtscBoFYvL19xwpi692nZjyPAGQBLMquVx8rexHUFVbs6UVM41Y/QV0UZLSlVM7xNl3nL/dQoxT8OC2a9WJThNm41EjFzzKAuUaWqjm4+uEsC9felBIzndlA5/bIn6EUkMb2X8qmOOIOod1UeVZeK0fWMoDdKsHtQjiQrrP4nLjOmrTQ+BF2yUHwFbW6SCQiXT1Jzq4zymnI717ZraTK0nXzl8amLrGGrh36TrR7pv9hWLeNIMCARvOtABMdQmrT1dI4FxLK1uKM696uzfoaZDUn58G2VGrd loewy gitlab" "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDROb8zcXAgqR3xNpStjt8kSL2Tnic+aWVlQRkmmLveay0RDPatHVKiWtscBoFYvL19xwpi692nZjyPAGQBLMquVx8rexHUFVbs6UVM41Y/QV0UZLSlVM7xNl3nL/dQoxT8OC2a9WJThNm41EjFzzKAuUaWqjm4+uEsC9felBIzndlA5/bIn6EUkMb2X8qmOOIOod1UeVZeK0fWMoDdKsHtQjiQrrP4nLjOmrTQ+BF2yUHwFbW6SCQiXT1Jzq4zymnI717ZraTK0nXzl8amLrGGrh36TrR7pv9hWLeNIMCARvOtABMdQmrT1dI4FxLK1uKM696uzfoaZDUn58G2VGrd loewy gitlab"
]; ];
agenixKeys = hostKeys ++ kanivanKeys; agenixKeys = hostKeys ++ kanivanKeys;
allKeys = loewyKeys ++ mikeKeys ++ kanivanKeys ++ deanKeys ++ alexKeys ++ hostKeys; allKeys = loewyKeys ++ mikeKeys ++ kanivanKeys ++ deanKeys ++ alexKeys ++ hostKeys;
railbird-sf = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDozY/3Cd9npaYPCgIn/E7MjW9c7Zb5/wTO5Qi7yRU45 root@railbird-sf"
];
} }

View File

@ -53,6 +53,13 @@ in
proxyPass = "http://[::1]:8222"; proxyPass = "http://[::1]:8222";
}; };
}; };
"cache.railbird.ai" = {
enableACME = true;
forceSSL = true;
locations."/" = {
proxyPass = "http://192.168.1.26:3090";
};
};
}; };
}; };

View File

@ -0,0 +1,96 @@
{ config, lib, pkgs, forEachUser, ... }:
{
imports = [
../configuration.nix
];
networking.hostName = "railbird-sf";
hardware.enableRedistributableFirmware = true;
boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
boot.loader.systemd-boot.enable = true;
hardware.opengl.extraPackages = [ pkgs.linuxPackages.nvidia_x11.out ];
hardware.opengl.extraPackages32 = [ pkgs.linuxPackages.nvidia_x11.lib32 ];
services.xserver = {
videoDrivers = [ "nvidia" ];
};
# Enable OpenGL
hardware.opengl = {
enable = true;
driSupport = true;
driSupport32Bit = true;
};
hardware.nvidia = {
# Modesetting is required.
modesetting.enable = true;
# Nvidia power management. Experimental, and can cause sleep/suspend to fail.
powerManagement.enable = false;
# Fine-grained power management. Turns off GPU when not in use.
# Experimental and only works on modern Nvidia GPUs (Turing or newer).
powerManagement.finegrained = false;
# Use the NVidia open source kernel module (not to be confused with the
# independent third-party "nouveau" open source driver).
# Support is limited to the Turing and later architectures. Full list of
# supported GPUs is at:
# https://github.com/NVIDIA/open-gpu-kernel-modules#compatible-gpus
# Only available from driver 515.43.04+
# Currently alpha-quality/buggy, so false is currently the recommended setting.
open = false;
# Enable the Nvidia settings menu,
# accessible via `nvidia-settings`.
nvidiaSettings = true;
# Optionally, you may need to select the appropriate driver version for your specific GPU.
package = config.boot.kernelPackages.nvidiaPackages.stable;
};
features.full.enable = false;
modules.base.enable = true;
modules.desktop.enable = true;
modules.xmonad.enable = false;
modules.gnome.enable = true;
modules.code.enable = true;
modules.syncthing.enable = true;
modules.fonts.enable = true;
modules.plasma.enable = false;
modules.gitea-runner.enable = true;
fileSystems."/" =
{ device = "/dev/disk/by-uuid/a317d456-6f84-41ee-a149-8e466e414aae";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/B875-39D4";
fsType = "vfat";
};
swapDevices =
[ { device = "/dev/disk/by-uuid/129345f3-e1e1-4d45-9db9-643160c6d564"; }
];
environment.systemPackages = with pkgs; [
android-studio
];
networking.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
home-manager.users = forEachUser {
home.stateVersion = "23.11";
};
system.stateVersion = "23.11";
}

View File

@ -33,6 +33,13 @@
"nixpkgs=${inputs.nixpkgs.outPath}" "nixpkgs=${inputs.nixpkgs.outPath}"
]; ];
settings.nix-path = nixPath; settings.nix-path = nixPath;
binaryCaches = [
"https://cache.nixos.org"
"https://cache.railbird.ai"
];
binaryCachePublicKeys = [
"cache.railbird.ai:KhnvcouxtIU2zxUcjJsm4bUK3o1S3p8xMf9qfZGF7/A="
];
}; };
nixpkgs.overlays = [ nixpkgs.overlays = [

View File

@ -11,7 +11,6 @@ specialArgs.makeEnable config "modules.nixified-ai" false {
services.invokeai = { services.invokeai = {
enable = false; enable = false;
host = "0.0.0.0"; host = "0.0.0.0";
nsfwChecker = false;
package = inputs.nixified-ai.packages.${config.nixpkgs.system}.invokeai-nvidia; package = inputs.nixified-ai.packages.${config.nixpkgs.system}.invokeai-nvidia;
}; };
} }

7
nixos/plasma.nix Normal file
View File

@ -0,0 +1,7 @@
{ config, makeEnable, ... }:
makeEnable config "modules.plasma" true {
services.xserver = {
desktopManager.plasma5.enable = true;
displayManager.sddm.enable = true;
};
}

@ -1 +0,0 @@
Subproject commit 74ee66bcb6c3a1ba509d1e78435e391255dc0647

Binary file not shown.

View File

@ -1 +1 @@
1896Folsom.duckdns.org:U2FTjvP95qwAJo0oGpvmUChJCgi5zQoG1YisoI08Qoo= cache.railbird.ai:KhnvcouxtIU2zxUcjJsm4bUK3o1S3p8xMf9qfZGF7/A=

View File

@ -0,0 +1,50 @@
age-encryption.org/v1
-> ssh-ed25519 ZgrTqA l0dMBQ+mzUqOkjhcZb3zfBx5awxBD8TC6Sejvcc4Nh0
WwJOAzlQ0jMW422f3D4OSTs9ZuFFloBSur16suRi0fY
-> ssh-ed25519 ZaBdSg WThBx9L+OF7gVIY5iz190Kc93HwexYuXt97UCIcdGy4
vNfDlA8dU8QKK1Rof172EH5PWspxE7dhZwJpKlijGm0
-> ssh-ed25519 MHZylw Y9cialnlgyNxmHJfYZkSxAkk1tLzCwM3bwI22RKrI1o
5c++eOluYJRDa8qvjyygtzV88mmghm5q3ddS0FsdjF0
-> ssh-ed25519 sIUg6g rZZdwkjc8+3hwRb/3k6CrZuQKekbY2aLtWln1ogXvCE
ei61DC65urGTLCPXTeuN0x2KgIyeVUZPKAJEArjypq8
-> ssh-ed25519 TnanwQ m3IDl/HTsD+7oAwVlM6092463ZnUlYHZ7ihV9oBcvX8
tx3iUS1l67Trzkbmo5sbM1qV41bTercjMK/CO3JCBvk
-> ssh-rsa gwJx0Q
Y1crfgn2QJyaU2zHGVSjygOTT0QIUavS3OaXqcBnQhotG4ofsjvNfwvg0KwGf2YQ
6WyVEtQV+AgB8A6jOZK9I7BVCLnaYfal+aCO9QH/kxGAbqFNqkb9csVXVz2/LlyK
IFvoWGMG9wm8pU36ti5k8Fi4lUSNXuOorQa8XRS2g6H/XT4P96y4vDuluQrQKE76
MfwmxQ5rTjT5hy5mBrN++NURxC0EZvFZwxOuokYpasVyblmEEneZsCxpc1ONfuDz
Ax+DaKAfgQA4oP55ikCxdN5rB1tJUPGa7GafH43elJPucFrvKReaV3rLjy+RefzP
Q5FgFW/2vDMcuG3yJGUwaA
-> ssh-ed25519 YFIoHA 3F+FMd5Gj2MQDunB6sSFNNOKb7XaP30ij8vuiz54ayI
YXwe09UjplCrBIqMV4p+xfp8micbLxBnY/htwtvVhAk
-> ssh-ed25519 KQfiow SiDaVLgOLymOZ4QQOrpDJWocnqqf2areMylDPfsni3Y
gMPKQ74JLMKl3liWlhyoF9A2rdpKN3oQ19ZK17piGcw
-> ssh-ed25519 kScIxg KpZuFWCy4EIk324AkNhqKKXgJyhJX9/071bxtQdQ5TI
/FnWALolYT5FjhN6IxQ3IKjP8eLfonCoLAD8QTAmAp8
-> ssh-ed25519 HzX1zw pGJLVel8C/Qg/HTI/ekfBDYD0o0HiEbovqniHieyFVQ
TzHJaB3goP6m7OPfqJMdlRJeMihbMyz1dhvUFg5Ko7o
-> ssh-ed25519 KQfiow hdTZfjybriu7Jl1P3KSwardvCTem+YwpoogxhAhhf2o
tUOv9Ub8XuIxf3Xv0T1O0JfIg+QEvbXgsq3cleOiTm8
-> ssh-ed25519 1o2X0w gWE13QqmOzrHPHh7L3UX0JUrJspCqqLrefifjaf8LlM
DNV+bMcbiaVO3QzLjWEmmJ6e1AfLqnmJMbtuJ/3VipA
-> ssh-ed25519 KQ5iUA IdTClBsn0xfXbCgfXKKsYBouHjMZLF4TrD0uICBSFAw
xuvTiSUXWKCU6WPQrQQcTHOxSi+YOOQvrcbBkrzcxyc
-> ssh-ed25519 AKGkDw czy6lPmq14fDfnfQxTG/q4StRV9Dbgh9co4CcZ12yV8
ivMgg4UULwZ8jh4yK7EpsDGSEoIR5xlrnKWL8ZAlsak
-> ssh-ed25519 0eS5+A LnU67iEwQBOMt+oU7ShVfI9EX6jpcArD5E57w/bqfTs
npKu1OfCD9uEOe1WZ+uTgJSnRBWo9H0rTgir2M/CXwI
-> ssh-ed25519 9/4Prw DnnPJmI+BMsuv/Mavp1kkXMLW9pwBQdMHuGdapOPhB8
XbSJ/6whMg6FSe9A4bkv/9a/dsyk3X0A8vPUF9HCXo4
-> ssh-ed25519 gAk3+Q fgDvT4ZPXNghio5lSrOmCU8MQmrXj6IpB0BYfZSC2D4
h8hsQb92PV3+1Ehdp592oEMycEI5FAK2toiTfHLb/o0
-> ssh-ed25519 X6eGtQ K5HPNu6Y0DBwMKKCZkCCpNq8s5s/xN58XkM4x9DaAEg
Zf4ot5C3rKXyU/yp9DP1b/dqJb/ZCOG9ZsCSClk4HxY
-> ssh-ed25519 0ma8Cw CYn3h6XygyxE67mDJlM4SSibHDPqFyBWKPzQAHlszjU
ktdOsrypNDlbULxwDOe8voCGrkSWP4TMXSxkUCcEO2U
-> ssh-ed25519 qQi7yA LV1T24o2hw+nsinXfxWwlnFsCu7O0qo0bRJF45gJklY
g8gRXO+KWgsYT8sMdGD1R06v4C4xiSSOTZDTA9ODq/4
-> T!M=;-grease CA
Q+IGMGZNHepXZ9eLFTKNdHUatSF9iUvfL4sjdJwNc6ft
--- rnkSxq/yrqGe+Kw6y/sby0uQ5vydFwslx0ksoNRi7J0
ôIÈ|ŸW(T ë)R³ÛÅ©þú ýcj‡rLæ<4C>qµZV»Ìjì7¨fuaÙQTñ.´ãZc¡‰YÉ"Xè˫鞌銖¨

View File

@ -9,4 +9,5 @@ in
"gitea-runner-token.nixquick.age".publicKeys = keys.agenixKeys; "gitea-runner-token.nixquick.age".publicKeys = keys.agenixKeys;
"gitea-runner-token.jimi-hendnix.age".publicKeys = keys.agenixKeys; "gitea-runner-token.jimi-hendnix.age".publicKeys = keys.agenixKeys;
"gitea-runner-token.adele.age".publicKeys = keys.agenixKeys; "gitea-runner-token.adele.age".publicKeys = keys.agenixKeys;
"gitea-runner-token.railbird-sf.age".publicKeys = keys.agenixKeys ++ keys.railbird-sf;
} }

View File

@ -12,6 +12,7 @@ let
jay-lenovo-wsl = { id = "F3HW6DZ-B7BFACJ-SRAUM7Z-56TXQJ5-5WKZT5A-GKXAHVD-YLXFJ4M-G7OJQQC"; }; jay-lenovo-wsl = { id = "F3HW6DZ-B7BFACJ-SRAUM7Z-56TXQJ5-5WKZT5A-GKXAHVD-YLXFJ4M-G7OJQQC"; };
jay-lenovo = { id = "AP5ZUKJ-QBVYWCN-DYHR3UB-JJXRWNI-CAORGYM-HWRKHEH-ZJSTRLN-PP5USQX"; }; jay-lenovo = { id = "AP5ZUKJ-QBVYWCN-DYHR3UB-JJXRWNI-CAORGYM-HWRKHEH-ZJSTRLN-PP5USQX"; };
jimi-hendnix = { id = "55JWW5K-4NY5DKT-TR4MVPO-UNOMQKM-J7TYCRF-CCCZGPM-FVRKHID-JVFLAAV"; }; jimi-hendnix = { id = "55JWW5K-4NY5DKT-TR4MVPO-UNOMQKM-J7TYCRF-CCCZGPM-FVRKHID-JVFLAAV"; };
railbird-sf = { id = "5F4FPJM-KRBFVIH-CTTB2NC-7CPVGAM-CONMH2Q-SQPRODO-CWKRFPF-HVN4AAD"; };
}; };
allDevices = builtins.attrNames devices; allDevices = builtins.attrNames devices;
in in